Analysis
-
max time kernel
77s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
14-05-2022 15:03
Behavioral task
behavioral1
Sample
1716-71-0x00000000003B0000-0x00000000003D0000-memory.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1716-71-0x00000000003B0000-0x00000000003D0000-memory.exe
Resource
win10v2004-20220414-en
General
-
Target
1716-71-0x00000000003B0000-0x00000000003D0000-memory.exe
-
Size
128KB
-
MD5
73943755ec77aa8734b85cdf66cfa687
-
SHA1
96a313d4f92e3108ec4968191cb09e54309c1c61
-
SHA256
f341c3e45f181170afcb9319faf06996d3892949ab5078e26df9432ccffa4709
-
SHA512
570abfb9d7169e56f59ac80f13f9e50845f861ed7da7d5a580696b74543b2251c827c2abe9bd7fd5c514ff3d78efbafe39fbb8289528040f95465f5c73ab9a29
Malware Config
Extracted
redline
test1
23.88.112.179:19536
-
auth_value
68c6114f4d4c471ad88677f54e75676f
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2832-130-0x0000000000780000-0x00000000007A0000-memory.dmp family_redline -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3676 2832 WerFault.exe 1716-71-0x00000000003B0000-0x00000000003D0000-memory.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1716-71-0x00000000003B0000-0x00000000003D0000-memory.exe"C:\Users\Admin\AppData\Local\Temp\1716-71-0x00000000003B0000-0x00000000003D0000-memory.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 7842⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2832 -ip 28321⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2832-130-0x0000000000780000-0x00000000007A0000-memory.dmpFilesize
128KB